firefox vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the firefox package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
ELSA-2011-1268

<0:3.6.22-1.0.1.el5_7
  • C
Use After Free

<0:45.8.0-2.0.1.el5_11
  • C
Out-of-Bounds

<0:45.8.0-2.0.1.el5_11
  • C
DEPRECATED: Use of Uninitialized Resource

<0:45.8.0-2.0.1.el5_11
  • C
Information Exposure

<0:45.8.0-2.0.1.el5_11
  • C
Error Handling

<0:45.8.0-2.0.1.el5_11
  • C
Information Exposure

<0:45.8.0-2.0.1.el5_11
  • C
Use After Free

<0:45.8.0-2.0.1.el5_11
  • C
Out-of-Bounds

<0:45.8.0-2.0.1.el5_11
  • C
CVE-2017-5386

<0:45.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.8.0-2.0.1.el5_11
  • C
Out-of-Bounds

<0:45.7.0-1.0.1.el5_11
  • C
Use After Free

<0:45.7.0-1.0.1.el5_11
  • C
Use After Free

<0:45.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.7.0-1.0.1.el5_11
  • C
Information Exposure

<0:45.7.0-1.0.1.el5_11
  • C
CVE-2017-5390

<0:45.7.0-1.0.1.el5_11
  • C
Use After Free

<0:45.7.0-1.0.1.el5_11
  • C
Improper Input Validation

<0:45.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el5_11
  • C
Use After Free

<0:45.6.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.6.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el5_11
  • C
Information Exposure

<0:45.6.0-1.0.1.el5_11
  • C
Integer Overflow or Wraparound

<0:45.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el5_11
  • C
Security Features

<0:45.6.0-1.0.1.el5_11
  • C
Origin Validation Error

<0:45.6.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.6.0-1.0.1.el5_11
  • C
Improper Access Control

<0:45.6.0-1.0.1.el5_11
  • C
Use After Free

<0:45.5.1-1.0.1.el5_11
  • C
Use After Free

<0:45.6.0-1.0.1.el5_11
  • C
Security Features

<0:45.6.0-1.0.1.el5_11
  • C
Improper Input Validation

<0:45.6.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.5.0-1.0.1.el5_11
  • C
Improper Certificate Validation

<0:45.5.0-1.0.1.el5_11
  • C
Integer Overflow or Wraparound

<0:45.5.0-1.0.1.el5_11
  • C
Improper Input Validation

<0:45.5.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.2.0-1.0.1.el5_11
  • C
Security Features

<0:45.2.0-1.0.1.el5_11
  • C
Use After Free

<0:45.4.0-1.0.1.el5_11
  • C
Use After Free

<0:45.4.0-1.0.1.el5_11
  • C
Improper Input Validation

<0:45.4.0-1.0.1.el5_11
  • C
Use After Free

<0:45.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el5_11
  • C
Improper Input Validation

<0:45.4.0-1.0.1.el5_11
  • C
Use After Free

<0:45.4.0-1.0.1.el5_11
  • C
Information Exposure

<0:45.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.4.0-1.0.1.el5_11
  • C
Use After Free

<0:45.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el5_11
  • C
Information Exposure

<0:45.3.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.3.0-1.0.1.el5_11
  • C
Information Exposure

<0:45.3.0-1.0.1.el5_11
  • C
Use After Free

<0:45.3.0-1.0.1.el5_11
  • C
Use After Free

<0:45.3.0-1.0.1.el5_11
  • C
Use After Free

<0:45.3.0-1.0.1.el5_11
  • C
Use After Free

<0:45.3.0-1.0.1.el5_11
  • C
Incorrect Type Conversion or Cast

<0:45.3.0-1.0.1.el5_11
  • C
Cross-site Scripting (XSS)

<0:45.3.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.2.0-1.0.1.el5_11
  • C
CVE-2016-2828

<0:45.2.0-1.0.1.el5_11
  • C
CVE-2016-2821

<0:45.2.0-1.0.1.el5_11
  • C
Improper Access Control

<0:45.2.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:45.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Security Features

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
CVE-2016-1960

<0:38.7.0-1.0.1.el5_11
  • C
Improper Data Handling

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.6.1-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.6.1-1.0.1.el5_11
  • C
Security Features

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
Improper Data Handling

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.6.0-1.0.1.el5_11
  • C
CVE-2016-1962

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.6.0-1.0.1.el5_11
  • C
CVE-2016-1973

<0:38.7.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.7.0-1.0.1.el5_11
  • C
CVE-2016-1964

<0:38.7.0-1.0.1.el5_11
  • C
Access Restriction Bypass

<0:38.7.0-1.0.1.el5_11
  • C
CVE-2016-1961

<0:38.7.0-1.0.1.el5_11
  • C
CVE-2016-1523

<0:38.6.1-1.0.1.el5_11
  • C
CVE-2016-1966

<0:38.7.0-1.0.1.el5_11
  • C
Numeric Errors

<0:38.5.0-2.0.1.el5_11
  • C
Security Features

<0:38.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.5.0-2.0.1.el5_11
  • C
CVE-2015-7210

<0:38.5.0-2.0.1.el5_11
  • C
Numeric Errors

<0:38.5.0-2.0.1.el5_11
  • C
Numeric Errors

<0:38.5.0-2.0.1.el5_11
  • C
Information Exposure

<0:38.5.0-2.0.1.el5_11
  • C
Numeric Errors

<0:38.5.0-2.0.1.el5_11
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el5_11
  • C
Access Restriction Bypass

<0:38.4.0-1.0.1.el5_11
  • C
Security Features

<0:38.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el5_11
  • C
Code

<0:38.4.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.4.0-1.0.1.el5_11
  • C
Race Condition

<0:38.3.0-2.0.1.el5_11
  • C
CVE-2015-4497

<0:38.2.1-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Information Exposure

<0:38.2.0-4.0.1.el5_11
  • H
CVE-2015-4495

<0:38.1.1-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.3.0-2.0.1.el5_11
  • C
CVE-2015-4509

<0:38.3.0-2.0.1.el5_11
  • C
Security Features

<0:38.2.1-1.0.1.el5_11
  • C
CVE-2015-2728

<0:38.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Numeric Errors

<0:38.2.0-4.0.1.el5_11
  • C
Numeric Errors

<0:38.2.0-4.0.1.el5_11
  • C
CVE-2015-4492

<0:38.2.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.2.0-4.0.1.el5_11
  • C
Numeric Errors

<0:38.2.0-4.0.1.el5_11
  • C
CVE-2015-4488

<0:38.2.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el5_11
  • C
Cryptographic Issues

<0:38.1.0-1.0.1.el5_11
  • C
Improper Input Validation

<0:38.1.0-1.0.1.el5_11
  • C
Code

<0:38.1.0-1.0.1.el5_11
  • C
CVE-2015-2722

<0:38.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el5_11
  • C
Code

<0:38.1.0-1.0.1.el5_11
  • C
Code

<0:38.1.0-1.0.1.el5_11
  • C
Code

<0:38.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el5_11
  • C
Code

<0:38.1.0-1.0.1.el5_11
  • C
CVE-2015-2731

<0:38.1.0-1.0.1.el5_11
  • C
Out-of-Bounds

<0:38.1.0-1.0.1.el5_11
  • C
Code

<0:38.1.0-1.0.1.el5_11
  • C
CVE-2015-2733

<0:38.1.0-1.0.1.el5_11
  • C
CVE-2015-2713

<0:38.0-4.0.1.el5_11
  • C
CVE-2015-2708

<0:38.0-4.0.1.el5_11
  • C
CVE-2015-0797

<0:38.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:38.0-4.0.1.el5_11
  • C
CVE-2015-0813

<0:31.6.0-2.0.1.el5_11
  • C
Code

<0:31.5.3-1.0.1.el5_11
  • C
CVE-2015-0815

<0:31.6.0-2.0.1.el5_11
  • C
Access Restriction Bypass

<0:31.5.3-1.0.1.el5_11
  • C
Cross-site Request Forgery (CSRF)

<0:31.6.0-2.0.1.el5_11
  • C
Access Restriction Bypass

<0:31.6.0-2.0.1.el5_11
  • C
Access Restriction Bypass

<0:31.6.0-2.0.1.el5_11
  • C
Out-of-Bounds

<0:31.5.0-1.0.1.el5_11
  • C
CVE-2015-0831

<0:31.5.0-1.0.1.el5_11
  • C
CVE-2015-0836

<0:31.5.0-1.0.1.el5_11
  • C
Information Exposure

<0:31.5.0-1.0.1.el5_11
  • C
CVE-2014-8634

<0:31.4.0-1.0.1.el5_11
  • C
CVE-2014-8641

<0:31.4.0-1.0.1.el5_11
  • C
CVE-2014-8639

<0:31.4.0-1.0.1.el5_11
  • C
Cross-site Request Forgery (CSRF)

<0:31.4.0-1.0.1.el5_11
  • C
Improper Input Validation

<0:31.3.0-4.0.1.el5_11
  • C
Improper Input Validation

<0:31.3.0-4.0.1.el5_11
  • C
Improper Input Validation

<0:31.3.0-4.0.1.el5_11
  • C
Out-of-Bounds

<0:31.3.0-4.0.1.el5_11
  • C
CVE-2014-1592

<0:31.3.0-4.0.1.el5_11
  • C
CVE-2014-1574

<0:31.2.0-3.0.1.el5_11
  • C
CVE-2014-1583

<0:31.2.0-3.0.1.el5_11
  • C
Out-of-Bounds

<0:31.2.0-3.0.1.el5_11
  • C
CVE-2014-1577

<0:31.2.0-3.0.1.el5_11
  • C
Out-of-Bounds

<0:31.2.0-3.0.1.el5_11
  • C
CVE-2014-1581

<0:31.2.0-3.0.1.el5_11
  • C
CVE-2014-1567

<0:24.8.0-2.0.1.el5_10
  • C
Out-of-Bounds

<0:24.8.0-2.0.1.el5_10
  • C
CVE-2014-1518

<0:24.5.0-1.0.1.el5_10
  • C
Out-of-bounds Write

<0:24.5.0-1.0.1.el5_10
  • C
Arbitrary Code Injection

<0:24.7.0-1.0.1.el5_10
  • C
CVE-2014-1547

<0:24.7.0-1.0.1.el5_10
  • C
Arbitrary Code Injection

<0:24.7.0-1.0.1.el5_10
  • C
CVE-2014-1555

<0:24.7.0-1.0.1.el5_10
  • C
CVE-2014-1538

<0:24.6.0-1.0.1.el5_10
  • C
CVE-2014-1541

<0:24.6.0-1.0.1.el5_10
  • C
CVE-2014-1533

<0:24.6.0-1.0.1.el5_10
  • C
Cross-site Scripting (XSS)

<0:24.5.0-1.0.1.el5_10
  • C
Buffer Overflow

<0:24.5.0-1.0.1.el5_10
  • C
Use After Free

<0:24.5.0-1.0.1.el5_10
  • C
Improper Privilege Management

<0:24.5.0-1.0.1.el5_10
  • C
Use After Free

<0:24.5.0-1.0.1.el5_10
  • C
Out-of-bounds Read

<0:24.4.0-1.0.1.el5_10
  • C
Information Exposure

<0:24.4.0-1.0.1.el5_10
  • C
Improper Privilege Management

<0:24.4.0-1.0.1.el5_10
  • C
Improper Privilege Management

<0:24.4.0-1.0.1.el5_10
  • C
Out-of-Bounds

<0:24.4.0-1.0.1.el5_10
  • C
Out-of-bounds Read

<0:24.4.0-1.0.1.el5_10
  • C
Buffer Overflow

<0:24.4.0-1.0.1.el5_10
  • C
Use After Free

<0:24.4.0-1.0.1.el5_10
  • C
Out-of-bounds Write

<0:24.4.0-1.0.1.el5_10
  • C
Out-of-bounds Write

<0:24.4.0-1.0.1.el5_10
  • C
Out-of-bounds Write

<0:24.3.0-2.0.1.el5_10
  • C
CVE-2014-1481

<0:24.3.0-2.0.1.el5_10
  • C
Use After Free

<0:24.3.0-2.0.1.el5_10
  • C
CVE-2014-1477

<0:24.3.0-2.0.1.el5_10
  • C
CVE-2014-1479

<0:24.3.0-2.0.1.el5_10
  • C
Origin Validation Error

<0:24.3.0-2.0.1.el5_10
  • C
Cross-site Scripting (XSS)

<0:24.2.0-1.0.1.el5_10
  • C
Arbitrary Code Injection

<0:24.2.0-1.0.1.el5_10
  • C
Use After Free

<0:24.2.0-1.0.1.el5_10
  • C
Use After Free

<0:24.2.0-1.0.1.el5_10
  • C
Improper Restriction of Rendered UI Layers or Frames

<0:24.2.0-1.0.1.el5_10
  • C
Use After Free

<0:24.2.0-1.0.1.el5_10
  • C
CVE-2013-5609

<0:24.2.0-1.0.1.el5_10
  • C
CVE-2013-5597

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5590

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5599

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5601

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.10-1.0.1.el5_10
  • C
CVE-2013-5600

<0:17.0.10-1.0.1.el5_10
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.9-1.0.1.el5_9
  • C
Improper Input Validation

<0:17.0.9-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.9-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.9-1.0.1.el5_9
  • C
CVE-2013-1701

<0:17.0.8-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.8-1.0.1.el5_9
  • C
Cross-site Scripting (XSS)

<0:17.0.8-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.8-1.0.1.el5_9
  • C
Improper Input Validation

<0:17.0.8-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.8-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
CVE-2013-1682

<0:17.0.7-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el5_9
  • C
Improper Input Validation

<0:17.0.7-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.7-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.7-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.7-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
Cross-site Scripting (XSS)

<0:17.0.6-1.0.1.el5_9
  • C
Out-of-Bounds

<0:17.0.6-1.0.1.el5_9
  • C
Improper Initialization

<0:17.0.6-1.0.1.el5_9
  • C
Resource Management Errors

<0:17.0.6-1.0.1.el5_9
  • C
CVE-2013-0801

<0:17.0.6-1.0.1.el5_9
  • C
CVE-2013-0796

<0:17.0.5-1.0.1.el5_9
  • C
Access Restriction Bypass

<0:17.0.5-1.0.1.el5_9
  • C
CVE-2013-0800

<0:17.0.5-1.0.1.el5_9
  • C
CVE-2013-0788

<0:17.0.5-1.0.1.el5_9
  • C
Cross-site Scripting (XSS)

<0:17.0.5-1.0.1.el5_9
  • C
Out-of-bounds Write

<0:17.0.3-1.0.1.el5_9
  • C
CVE-2013-0783

<0:17.0.3-1.0.1.el5_9
  • C
Use After Free

<0:17.0.3-1.0.1.el5_9
  • C
Use After Free

<0:17.0.3-1.0.1.el5_9
  • C
Improper Certificate Validation

<0:17.0.3-1.0.1.el5_9
  • C
CVE-2013-0746

<0:10.0.12-1.0.1.el5_9
  • C
Information Exposure

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Arbitrary Code Injection

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
CVE-2013-0769

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.8-1.0.2.el5_8
  • C
Integer Overflow or Wraparound

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.8-1.0.2.el5_8
  • C
Improper Authentication

<0:10.0.12-1.0.1.el5_9
  • C
Out-of-bounds Read

<0:10.0.12-1.0.1.el5_9
  • C
Use After Free

<0:10.0.12-1.0.1.el5_9
  • C
Out-of-Bounds

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Integer Overflow or Wraparound

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
CVE-2012-5842

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Use After Free

<0:10.0.11-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.11-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.11-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.10-1.0.1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.10-1.0.1.el5_8
  • C
Use After Free

<0:10.0.8-1.0.2.el5_8
  • C
Out-of-bounds Read

<0:10.0.8-1.0.2.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el5_8
  • C
Improper Privilege Management

<0:10.0.8-1.0.2.el5_8
  • C
CVE-2012-3982

<0:10.0.8-1.0.2.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el5_8
  • C
Use After Free

<0:10.0.8-1.0.2.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el5_8
  • C
Improper Input Validation

<0:10.0.8-1.0.2.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el5_8
  • C
Out-of-Bounds

<0:10.0.8-1.0.2.el5_8
  • C
Use After Free

<0:10.0.8-1.0.2.el5_8
  • C
Use After Free

<0:10.0.8-1.0.2.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.8-1.0.2.el5_8
  • C
Access Restriction Bypass

<0:10.0.8-1.0.2.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.7-1.0.1.el5_8
  • C
CVE-2012-3962

<0:10.0.7-1.0.1.el5_8
  • C
Numeric Errors

<0:10.0.7-1.0.1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.7-1.0.1.el5_8
  • C
Information Exposure

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Information Exposure

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Out-of-bounds Write

<0:10.0.7-1.0.1.el5_8
  • C
Use After Free

<0:10.0.7-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.6-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.6-1.0.1.el5_8
  • C
CVE-2012-1955

<0:10.0.6-1.0.1.el5_8
  • C
CVE-2012-1967

<0:10.0.6-1.0.1.el5_8
  • C
CVE-2012-1964

<0:10.0.6-1.0.1.el5_8
  • C
CVE-2012-1948

<0:10.0.6-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el5_8
  • C
Improper Input Validation

<0:10.0.6-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.6-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.6-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.6-1.0.1.el5_8
  • C
CVE-2012-1950

<0:10.0.6-1.0.1.el5_8
  • C
CVE-2011-3101

<0:10.0.5-1.0.1.el5_8
  • C
CVE-2012-1938

<0:10.0.5-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.5-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.5-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.5-1.0.1.el5_8
  • C
Information Exposure

<0:10.0.5-1.0.1.el5_8
  • C
CVE-2012-1937

<0:10.0.5-1.0.1.el5_8
  • C
CVE-2012-0479

<0:10.0.4-1.0.1.el5_8
  • C
Incorrect Calculation

<0:10.0.4-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.4-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.4-1.0.1.el5_8
  • C
Numeric Errors

<0:10.0.4-1.0.1.el5_8
  • C
Out-of-Bounds

<0:10.0.4-1.0.1.el5_8
  • C
CVE-2012-0467

<0:10.0.4-1.0.1.el5_8
  • C
Cross-site Scripting (XSS)

<0:10.0.3-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el5_8
  • C
Information Exposure

<0:10.0.3-1.0.1.el5_8
  • C
Arbitrary Code Injection

<0:10.0.3-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el5_8
  • C
CVE-2012-0461

<0:10.0.3-1.0.1.el5_8
  • C
CVE-2012-0462

<0:10.0.3-1.0.1.el5_8
  • C
Access Restriction Bypass

<0:10.0.3-1.0.1.el5_8
  • C
Resource Management Errors

<0:10.0.3-1.0.1.el5_8
  • C
Out-of-Bounds

<0:3.6.26-1.0.1.el5_7
  • C
CVE-2012-0442

<0:3.6.26-1.0.1.el5_7
  • C
Use After Free

<0:3.6.26-1.0.1.el5_7
  • C
Information Exposure

<0:3.6.26-1.0.1.el5_7
  • C
Out-of-Bounds

<0:3.6.26-1.0.1.el5_7
  • C
Cross-site Scripting (XSS)

<0:3.6.24-3.0.1.el5_7
  • C
Out-of-Bounds

<0:3.6.24-3.0.1.el5_7
  • C
Improper Input Validation

<0:3.6.24-3.0.1.el5_7
  • C
Arbitrary Code Injection

<0:3.6.20-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.6.23-2.0.1.el5_7
  • C
Numeric Errors

<0:3.6.23-2.0.1.el5_7
  • C
Arbitrary Code Injection

<0:3.6.23-2.0.1.el5_7
  • C
Access Restriction Bypass

<0:3.6.23-2.0.1.el5_7
  • C
Information Exposure

<0:3.6.20-2.0.1.el5
  • C
CVE-2011-2995

<0:3.6.23-2.0.1.el5_7
  • C
Configuration

<0:3.6.20-2.0.1.el5
  • C
CVE-2011-2982

<0:3.6.20-2.0.1.el5
  • C
Arbitrary Code Injection

<0:3.6.20-2.0.1.el5
  • C
Arbitrary Code Injection

<0:3.6.20-2.0.1.el5
  • C
Arbitrary Code Injection

<0:3.6.18-1.0.1.el5_6
  • C
CVE-2011-0074

<0:3.6.17-1.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el5_6
  • C
CVE-2011-2375

<0:3.6.18-1.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.18-1.0.1.el5_6
  • C
Numeric Errors

<0:3.6.18-1.0.1.el5_6
  • C
Access Restriction Bypass

<0:3.6.18-1.0.1.el5_6
  • C
Out-of-Bounds

<0:3.6.18-1.0.1.el5_6
  • C
CVE-2011-2376

<0:3.6.18-1.0.1.el5_6
  • C
CVE-2011-2374

<0:3.6.18-1.0.1.el5_6
  • C
CVE-2011-2364

<0:3.6.18-1.0.1.el5_6
  • C
CVE-2011-2365

<0:3.6.18-1.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.17-1.0.1.el5_6
  • C
CVE-2011-0080

<0:3.6.17-1.0.1.el5_6
  • C
CVE-2011-0075

<0:3.6.17-1.0.1.el5_6
  • C
Directory Traversal

<0:3.6.17-1.0.1.el5_6
  • C
Improper Input Validation

<0:3.6.17-1.0.1.el5_6
  • C
Improper Input Validation

<0:3.6.14-4.0.1.el5_6
  • C
CVE-2011-0070

<0:3.6.17-1.0.1.el5_6
  • C
Improper Input Validation

<0:3.6.17-1.0.1.el5_6
  • C
Improper Input Validation

<0:3.6.14-4.0.1.el5_6
  • C
CVE-2011-0069

<0:3.6.17-1.0.1.el5_6
  • C
CVE-2011-0081

<0:3.6.17-1.0.1.el5_6
  • C
CVE-2011-0072

<0:3.6.17-1.0.1.el5_6
  • C
CVE-2011-0078

<0:3.6.17-1.0.1.el5_6
  • C
CVE-2011-0077

<0:3.6.17-1.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.17-1.0.1.el5_6
  • C
Information Exposure

<0:3.6.17-1.0.1.el5_6
  • C
Cross-site Request Forgery (CSRF)

<0:3.6.14-4.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el5_6
  • C
CVE-2011-0062

<0:3.6.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el5_6
  • C
Resource Management Errors

<0:3.6.14-4.0.1.el5_6
  • C
Out-of-Bounds

<0:3.6.14-4.0.1.el5_6
  • C
CVE-2011-0053

<0:3.6.14-4.0.1.el5_6
  • C
Access Restriction Bypass

<0:3.6.7-2.0.1.el5
  • C
Buffer Overflow

<0:3.6.7-2.0.1.el5
  • C
CVE-2010-3771

<0:3.6.13-2.0.1.el5
  • C
Numeric Errors

<0:3.6.13-2.0.1.el5
  • C
CVE-2010-3773

<0:3.6.13-2.0.1.el5
  • C
Numeric Errors

<0:3.6.7-2.0.1.el5
  • C
Improper Input Validation

<0:3.6.7-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.13-2.0.1.el5
  • C
Improper Input Validation

<0:3.6.13-2.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.6.13-2.0.1.el5
  • C
Numeric Errors

<0:3.6.13-2.0.1.el5
  • C
Resource Management Errors

<0:3.6.13-2.0.1.el5
  • C
CVE-2010-3775

<0:3.6.13-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.13-2.0.1.el5
  • C
Improper Input Validation

<0:3.6.13-2.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.6.11-2.0.1.el5
  • C
CVE-2010-3176

<0:3.6.11-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.11-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.9-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.9-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.6.11-2.0.1.el5
  • C
CVE-2010-3182

<0:3.6.11-2.0.1.el5
  • C
Resource Management Errors

<0:3.6.11-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.11-2.0.1.el5
  • C
Cryptographic Issues

<0:3.6.11-2.0.1.el5
  • C
Cryptographic Issues

<0:3.6.11-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.6.9-2.0.1.el5
  • C
Numeric Errors

<0:3.6.9-2.0.1.el5
  • C
CVE-2010-3175

<0:3.6.11-2.0.1.el5
  • C
CVE-2010-3169

<0:3.6.9-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.9-2.0.1.el5
  • C
Resource Management Errors

<0:3.6.9-2.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.6.9-2.0.1.el5
  • C
Resource Management Errors

<0:3.6.9-2.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.6.9-2.0.1.el5
  • C
Use After Free

<0:3.6.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.6.7-2.0.1.el5
  • C
Improper Input Validation

<0:3.6.7-2.0.1.el5
  • C
Resource Management Errors

<0:3.6.7-2.0.1.el5
  • C
Resource Management Errors

<0:3.6.7-3.0.1.el5
  • C
Access Restriction Bypass

<0:3.6.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.6.9-2.0.1.el5
  • C
Arbitrary Code Injection

<0:3.6.7-2.0.1.el5
  • C
CVE-2010-1211

<0:3.6.7-2.0.1.el5
  • C
Arbitrary Code Injection

<0:3.6.9-2.0.1.el5
  • C
Out-of-Bounds

<0:3.6.7-2.0.1.el5
  • C
Information Exposure

<0:3.6.7-2.0.1.el5
  • C
Information Exposure

<0:3.6.7-2.0.1.el5
  • C
Integer Overflow or Wraparound

<0:3.6.7-2.0.1.el5
  • C
Numeric Errors

<0:3.6.7-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.0.11-2.0.1.el5_3
  • C
CVE-2010-1202

<0:3.6.4-8.0.1.el5
  • C
CVE-2010-1200

<0:3.6.4-8.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.6.4-8.0.1.el5
  • C
CVE-2010-1203

<0:3.6.4-8.0.1.el5
  • C
CVE-2008-5913

<0:3.6.4-8.0.1.el5
  • C
Information Exposure

<0:3.6.4-8.0.1.el5
  • C
Improper Input Validation

<0:3.6.4-8.0.1.el5
  • C
Numeric Errors

<0:3.6.4-8.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.6.4-8.0.1.el5
  • C
Arbitrary Code Injection

<0:3.6.4-8.0.1.el5
  • C
Resource Management Errors

<0:3.6.4-8.0.1.el5
  • C
Numeric Errors

<0:3.6.4-8.0.1.el5
  • C
Resource Management Errors

<0:3.0.19-1.0.1.el5_5
  • C
Arbitrary Code Injection

<0:3.0.19-1.0.1.el5_5
  • C
Resource Management Errors

<0:3.0.19-1.0.1.el5_5
  • C
Resource Management Errors

<0:3.0.19-1.0.1.el5_5
  • C
CVE-2010-0174

<0:3.0.19-1.0.1.el5_5
  • C
Arbitrary Code Injection

<0:3.0.19-1.0.1.el5_5
  • C
Access Restriction Bypass

<0:3.0.18-1.0.1.el5_4
  • C
Cross-site Scripting (XSS)

<0:3.0.18-1.0.1.el5_4
  • C
Arbitrary Code Injection

<0:3.0.18-1.0.1.el5_4
  • C
CVE-2010-0169

<0:3.0.18-1.0.1.el5_4
  • C
Resource Management Errors

<0:3.0.18-1.0.1.el5_4
  • C
Cross-site Scripting (XSS)

<0:3.0.18-1.0.1.el5_4
  • C
Out-of-Bounds

<0:3.0.18-1.0.1.el5_4
  • C
CVE-2010-0159

<0:3.0.18-1.0.1.el5_4
  • C
CVE-2009-3984

<0:3.0.16-1.0.1.el5_4
  • C
CVE-2009-3979

<0:3.0.16-1.0.1.el5_4
  • C
CVE-2009-3985

<0:3.0.16-1.0.1.el5_4
  • C
Arbitrary Code Injection

<0:3.0.16-1.0.1.el5_4
  • C
CVE-2009-3983

<0:3.0.16-1.0.1.el5_4
  • C
CVE-2009-3981

<0:3.0.16-1.0.1.el5_4
  • C
CVE-2009-3274

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-3372

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-3370

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-3382

<0:3.0.15-3.0.1.el5_4
  • C
Access Restriction Bypass

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-3076

<0:3.0.14-1.0.1.el5_4
  • C
Access Restriction Bypass

<0:3.0.15-3.0.1.el5_4
  • C
Arbitrary Code Injection

<0:3.0.14-1.0.1.el5_4
  • C
CVE-2009-3380

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-3384

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-1563

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-3075

<0:3.0.14-1.0.1.el5_4
  • C
Out-of-Bounds

<0:3.0.15-3.0.1.el5_4
  • C
CVE-2009-3074

<0:3.0.14-1.0.1.el5_4
  • C
Arbitrary Code Injection

<0:3.0.14-1.0.1.el5_4
  • C
CVE-2009-3071

<0:3.0.14-1.0.1.el5_4
  • C
Improper Input Validation

<0:3.0.14-1.0.1.el5_4
  • C
CVE-2009-3070

<0:3.0.14-1.0.1.el5_4
  • C
Configuration

<0:3.0.15-3.0.1.el5_4
  • C
Improper Input Validation

<0:3.0.14-1.0.1.el5_4
  • C
CVE-2009-3072

<0:3.0.14-1.0.1.el5_4
  • C
Resource Management Errors

<0:3.0.7-1.0.1.el5
  • C
Access of Uninitialized Pointer

<0:3.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:3.0.12-1.0.1.el5_3
  • C
CVE-2009-2467

<0:3.0.12-1.0.1.el5_3
  • C
Numeric Errors

<0:3.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:3.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:3.0.12-1.0.1.el5_3
  • C
Improper Input Validation

<0:3.0.12-1.0.1.el5_3
  • C
CVE-2009-2471

<0:3.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:3.0.12-1.0.1.el5_3
  • C
Resource Management Errors

<0:3.0.12-1.0.1.el5_3
  • C
Improper Input Validation

<0:3.0.11-2.0.1.el5_3
  • C
Arbitrary Code Injection

<0:3.0.11-2.0.1.el5_3
  • C
Access Restriction Bypass

<0:3.0.11-2.0.1.el5_3
  • C
Arbitrary Code Injection

<0:3.0.11-2.0.1.el5_3
  • C
Arbitrary Code Injection

<0:3.0.11-2.0.1.el5_3
  • C
Cross-site Scripting (XSS)

<0:3.0.12-1.0.1.el5_3
  • C
Race Condition

<0:3.0.11-2.0.1.el5_3
  • C
Information Exposure

<0:3.0.11-2.0.1.el5_3
  • C
Arbitrary Code Injection

<0:3.0.11-2.0.1.el5_3
  • C
Arbitrary Code Injection

<0:3.0.11-2.0.1.el5_3
  • C
Improper Input Validation

<0:3.0.9-1.0.1.el5
  • C
Configuration

<0:3.0.9-1.0.1.el5
  • C
Configuration

<0:3.0.9-1.0.1.el5
  • C
Improper Authentication

<0:3.0.11-2.0.1.el5_3
  • C
Resource Management Errors

<0:3.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.10-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0.9-1.0.1.el5
  • C
CVE-2009-0652

<0:3.0.9-1.0.1.el5
  • C
Configuration

<0:3.0.9-1.0.1.el5
  • C
Information Exposure

<0:3.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.9-1.0.1.el5
  • C
Configuration

<0:3.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.9-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0.9-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.7-1.0.1.el5
  • C
Improper Input Validation

<0:3.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.7-1.0.1.el5
  • C
Information Exposure

<0:3.0.7-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.7-1.0.1.el5
  • C
Improper Input Validation

<0:3.0-2.0.1.el5
  • C
CVE-2008-1235

<0:1.5.0.12-14.el5_1.0.1
  • C
Access Restriction Bypass

<0:3.0-2.0.1.el5
  • C
Link Following

<0:3.0.6-1.0.1.el5
  • C
Access Restriction Bypass

<0:3.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.6-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.6-1.0.1.el5
  • C
Access Restriction Bypass

<0:3.0.6-1.0.1.el5
  • C
CVE-2008-5501

<0:3.0.5-1.0.1.el5_2
  • C
Information Exposure

<0:3.0.6-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.5-1.0.1.el5_2
  • C
Information Exposure

<0:3.0.5-1.0.1.el5_2
  • C
CVE-2008-5510

<0:3.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:3.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:3.0.5-1.0.1.el5_2
  • C
Improper Input Validation

<0:3.0.5-1.0.1.el5_2
  • C
Access Restriction Bypass

<0:3.0.5-1.0.1.el5_2
  • C
Cross-site Scripting (XSS)

<0:3.0.5-1.0.1.el5_2
  • C
CVE-2007-3738

<0:1.5.0.12-3.el5.0.1
  • C
Resource Management Errors

<0:3.0.5-1.0.1.el5_2
  • C
Improper Input Validation

<0:3.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:1.5.0.12-15.el5_1.0.1
  • C
Race Condition

<0:3.0.4-1.0.1.el5
  • C
Arbitrary Code Injection

<0:3.0.4-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0.5-1.0.1.el5_2
  • C
Improper Authentication

<0:3.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.4-1.0.1.el5
  • C
Out-of-Bounds

<0:3.0.4-1.0.1.el5
  • C
Resource Management Errors

<0:3.0.4-1.0.1.el5
  • C
XML Injection

<0:3.0.4-1.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0.4-1.0.1.el5
  • C
Numeric Errors

<0:3.0.4-1.0.1.el5
  • C
Improper Input Validation

<0:3.0.4-1.0.1.el5
  • C
CVE-2007-3511

<0:1.5.0.12-6.el5.0.1
  • C
Improper Authentication

<0:1.5.0.12-14.el5_1.0.1
  • C
Resource Management Errors

<0:1.5.0.12-9.el5.0.1
  • C
CVE-2008-4063

<0:3.0.2-3.0.1.el5
  • C
Directory Traversal

<0:3.0.2-3.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0.2-3.0.1.el5
  • C
CVE-2008-3837

<0:3.0.2-3.0.1.el5
  • C
Resource Management Errors

<0:3.0.2-3.0.1.el5
  • C
Access Restriction Bypass

<0:3.0-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.0.2-3.0.1.el5
  • C
Numeric Errors

<0:3.0.2-3.0.1.el5
  • C
Improper Input Validation

<0:3.0-2.0.1.el5
  • C
Resource Management Errors

<0:3.0.2-3.0.1.el5
  • C
Directory Traversal

<0:3.0.2-3.0.1.el5
  • C
Improper Input Validation

<0:1.5.0.12-6.el5.0.1
  • C
Arbitrary Code Injection

<0:3.0.1-1.0.1.el5
  • C
Improper Input Validation

<0:1.5.0.12-6.el5.0.1
  • C
Improper Authentication

<0:3.0-2.0.1.el5
  • C
Improper Input Validation

<0:3.0.1-1.0.1.el5
  • C
Access Restriction Bypass

<0:3.0-2.0.1.el5
  • C
Access Restriction Bypass

<0:3.0.2-3.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0-2.0.1.el5
  • C
Numeric Errors

<0:3.0.1-1.0.1.el5
  • C
Resource Management Errors

<0:3.0-2.0.1.el5
  • C
Resource Management Errors

<0:3.0-2.0.1.el5
  • C
Information Exposure

<0:3.0-2.0.1.el5
  • C
Resource Management Errors

<0:3.0-2.0.1.el5
  • C
Cross-site Scripting (XSS)

<0:3.0-2.0.1.el5
  • C
Resource Management Errors

<0:1.5.0.12-14.el5_1.0.1
  • C
Link Following

<0:1.5.0.12-14.el5_1.0.1
  • C
Arbitrary Code Injection

<0:1.5.0.12-9.el5.0.1
  • C
Directory Traversal

<0:1.5.0.12-9.el5.0.1
  • C
Resource Management Errors

<0:1.5.0.12-14.el5_1.0.1
  • C
Information Exposure

<0:1.5.0.12-9.el5.0.1
  • C
Arbitrary Code Injection

<0:1.5.0.12-14.el5_1.0.1
  • C
Cross-site Scripting (XSS)

<0:1.5.0.12-14.el5_1.0.1
  • C
Resource Management Errors

<0:1.5.0.12-9.el5.0.1
  • C
CVE-2008-0592

<0:1.5.0.12-9.el5.0.1
  • C
Cross-site Scripting (XSS)

<0:1.5.0.12-7.el5.0.1
  • C
CVE-2007-1095

<0:1.5.0.12-6.el5.0.1
  • C
CVE-2007-3844

<0:1.5.0.12-6.el5.0.1
  • C
Cross-site Scripting (XSS)

<0:1.5.0.12-9.el5.0.1
  • C
Information Exposure

<0:1.5.0.12-9.el5.0.1
  • C
CVE-2008-0591

<0:1.5.0.12-9.el5.0.1
  • C
Cross-site Scripting (XSS)

<0:1.5.0.12-9.el5.0.1
  • C
Improper Input Validation

<0:1.5.0.12-6.el5.0.1
  • C
Directory Traversal

<0:1.5.0.12-7.el5.0.1
  • C
Resource Management Errors

<0:1.5.0.12-9.el5.0.1
  • C
CVE-2007-5959

<0:1.5.0.12-7.el5.0.1
  • C
Configuration

<0:1.5.0.12-6.el5.0.1
  • C
CVE-2007-3735

<0:1.5.0.12-3.el5.0.1
  • C
Configuration

<0:1.5.0.12-6.el5.0.1
  • C
Information Exposure

<0:1.5.0.12-6.el5.0.1
  • C
CVE-2007-3089

<0:1.5.0.12-3.el5.0.1
  • C
CVE-2007-3736

<0:1.5.0.12-3.el5.0.1
  • C
CVE-2007-3737

<0:1.5.0.12-3.el5.0.1
  • C
CVE-2007-3734

<0:1.5.0.12-3.el5.0.1
  • C
Information Exposure

<0:1.5.0.12-3.el5.0.1
  • C
CVE-2007-2869

<0:1.5.0.12-1.el5.0.1
  • C
Arbitrary Code Injection

<0:1.5.0.12-1.el5.0.1
  • C
Improper Input Validation

<0:1.5.0.12-1.el5.0.1
  • C
CVE-2007-2870

<0:1.5.0.12-1.el5.0.1
  • C
CVE-2007-2871

<0:1.5.0.12-1.el5.0.1
  • C
Information Exposure

<0:1.5.0.12-1.el5.0.1
  • C
Out-of-Bounds

<0:1.5.0.12-1.el5.0.1